We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 443d0f5 commit 17218faCopy full SHA for 17218fa
java/ql/src/experimental/Security/CWE/CWE-089/MyBatisCommonLib.qll
@@ -135,7 +135,8 @@ predicate isMybatisXmlOrAnnotationSqlInjection(
135
"%}") and
136
annotation.getType() instanceof TypeParam and
137
ma.getAnArgument() = node.asExpr() and
138
- annotation.getTarget() = ma.getMethod().getParameter(node.asExpr().(Argument).getParameterPos())
+ annotation.getTarget() =
139
+ ma.getMethod().getParameter(node.asExpr().(Argument).getParameterPos())
140
)
141
or
142
// MyBatis default parameter sql injection vulnerabilities.the default parameter form of the method is arg[0...n] or param[1...n].
0 commit comments